-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issues from Disgord #24
Comments
andersfylling/disgord#26 (by @andersfylling) outlines an issue with a lack of support for OAuth2 flows. Disgo implements and provides steps for all OAuth2 flows in oauth2.go. |
andersfylling/disgord#283 (by @Kelwing) addresses an inefficiency with Per Resource Per Route (Emoji) rate limits. This user expects 4 rps per channel, but only receives 1 rps with Disgord for endpoints that use reactions. This issue is explained in #22. |
andersfylling/disgord#343 outlines that rate limits should be applied to the entire bot, rather than per the entire bot. Disgo handles this functionality in |
andersfylling/disgord#81 addresses an issue regarding unit tests with Disgord. Users can unit test Disgo by passing events to respective handler functions. This can occur since each handler function uses it's respective event. |
andersfylling/disgord#77 is a developer ergonomics improvement that may be added to the |
andersfylling/disgord#357 addresses a request for a rate limiting test. Disgo provides a rate limiting test in |
andersfylling/disgord#391 (by @meooow25) outlines an issue with a Per Resource (shared) rate limit. This issue is explained in #22. The actual phenomenon experienced by the user can be considered unavoidable since discovery can only occur once a request has been made. However, after that point, an ideal rate limit implementation should account for the shared Token Bucket. One way to reduce this incident from occuring is through the use of default buckets. For more information, read What is a Rate Limit?. |
andersfylling/disgord#418 is addressed in the thread. |
andersfylling/disgord#433 is already addressed by the tools module. |
andersfylling/disgord#353 addresses rate limits, but this implementation (using In addition to the details present in "What is a Request?", a rate limiter by the rate package will only provide tokens every x intervals. This can result in a situation where the user wants to send a bulk of requests at the edges of a Token Bucket or Fixed Window reset period, but cannot generate more than 1 token per interval in enough time. As a result, this implementation compromises efficiency to ensure the user doesn't send more tokens than the rate limit. However, this compromise is NOT necessary for a valid rate limit implementation. In addition, the specific implementation described doesn't allow the user to determine how many requests are sent first. |
Disgo solves the following issues from https://github.com/andersfylling/disgord/issues.
The text was updated successfully, but these errors were encountered: